On Tue, 8 May 2007, Andrew Morton wrote: > happens when a local process sends packets with invalid IP headers > through raw sockets. [...] > Whatever happens, that printk should be toned down, shouldn't it? We > prefer to not let unprivileged apps spam the logs.
Isn't "unprivileged app sending packet through raw socket" an oxymoron? As Patrick pointed out, the message is there for a reason, I'd suggest using printk_ratelimit() in this case. -- Jiri Kosina - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html